07-12-2017 17:26 via telecoms.com

Protecting Against Malware: Using DPI Inside Security Solutions to Detect Lateral Movements

When malware successfully infiltrates a network, it typically evolves through the cyber kill chain in an attempt to reach the final goal of data exfiltration, a ransom request and so on. During the lateral movement stage, when it tries to propagate the network and access resources, it generates specific types of network traffic. It is here that it becomes most vulnerable to detection. However, distinguishing potential threats from legitimate traffic requires the management and analysis of huge a
Read more »